Skip to content
Snippets Groups Projects
Verified Commit 4a530812 authored by Lee Rowlands's avatar Lee Rowlands
Browse files

Issue #3410210 by quietone, sourabhjain, smustgrave, Spokje, catch: Remove...

Issue #3410210 by quietone, sourabhjain, smustgrave, Spokje, catch: Remove statistics module from comments
parent 5d87e70d
No related branches found
No related tags found
No related merge requests found
...@@ -8,7 +8,6 @@ ...@@ -8,7 +8,6 @@
* @see index.php * @see index.php
* @see core/install.php * @see core/install.php
* @see core/rebuild.php * @see core/rebuild.php
* @see core/modules/statistics/statistics.php
*/ */
return require __DIR__ . '/vendor/autoload.php'; return require __DIR__ . '/vendor/autoload.php';
...@@ -113,7 +113,6 @@ protected static function autoLoadContents($relative_autoload_path) { ...@@ -113,7 +113,6 @@ protected static function autoLoadContents($relative_autoload_path) {
* @see index.php * @see index.php
* @see core/install.php * @see core/install.php
* @see core/rebuild.php * @see core/rebuild.php
* @see core/modules/statistics/statistics.php
*/ */
return require __DIR__ . '/{$relative_autoload_path}'; return require __DIR__ . '/{$relative_autoload_path}';
......
...@@ -355,14 +355,13 @@ ...@@ -355,14 +355,13 @@
* security, or encryption benefits. In an environment where Drupal * security, or encryption benefits. In an environment where Drupal
* is behind a reverse proxy, the real IP address of the client should * is behind a reverse proxy, the real IP address of the client should
* be determined such that the correct client IP address is available * be determined such that the correct client IP address is available
* to Drupal's logging, statistics, and access management systems. In * to Drupal's logging and access management systems. In the most simple
* the most simple scenario, the proxy server will add an * scenario, the proxy server will add an X-Forwarded-For header to the request
* X-Forwarded-For header to the request that contains the client IP * that contains the client IP address. However, HTTP headers are vulnerable to
* address. However, HTTP headers are vulnerable to spoofing, where a * spoofing, where a malicious client could bypass restrictions by setting the
* malicious client could bypass restrictions by setting the * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
* X-Forwarded-For header directly. Therefore, Drupal's proxy * requires the IP addresses of all remote proxies to be specified in
* configuration requires the IP addresses of all remote proxies to be * $settings['reverse_proxy_addresses'] to work correctly.
* specified in $settings['reverse_proxy_addresses'] to work correctly.
* *
* Enable this setting to get Drupal to determine the client IP from the * Enable this setting to get Drupal to determine the client IP from the
* X-Forwarded-For header. If you are unsure about this setting, do not have a * X-Forwarded-For header. If you are unsure about this setting, do not have a
......
...@@ -136,13 +136,6 @@ public static function preRenderLink($element) { ...@@ -136,13 +136,6 @@ public static function preRenderLink($element) {
* // passing in to links.html.twig. * // passing in to links.html.twig.
* ), * ),
* ), * ),
* 'statistics' => array(
* '#theme' => 'links__node__statistics',
* '#links' => array(
* // An array of links associated with node statistics, suitable for
* // passing in to links.html.twig.
* ),
* ),
* 'translation' => array( * 'translation' => array(
* '#theme' => 'links__node__translation', * '#theme' => 'links__node__translation',
* '#links' => array( * '#links' => array(
......
...@@ -2,7 +2,6 @@ ...@@ -2,7 +2,6 @@
label: 'Viewing lists of recently-updated content' label: 'Viewing lists of recently-updated content'
related: related:
- core.tracking_content - core.tracking_content
- statistics.tracking_popular_content
- history.tracking_user_content - history.tracking_user_content
--- ---
{% set recent_link_text %} {% set recent_link_text %}
......
...@@ -355,14 +355,13 @@ ...@@ -355,14 +355,13 @@
* security, or encryption benefits. In an environment where Drupal * security, or encryption benefits. In an environment where Drupal
* is behind a reverse proxy, the real IP address of the client should * is behind a reverse proxy, the real IP address of the client should
* be determined such that the correct client IP address is available * be determined such that the correct client IP address is available
* to Drupal's logging, statistics, and access management systems. In * to Drupal's logging and access management systems. In the most simple
* the most simple scenario, the proxy server will add an * scenario, the proxy server will add an X-Forwarded-For header to the request
* X-Forwarded-For header to the request that contains the client IP * that contains the client IP address. However, HTTP headers are vulnerable to
* address. However, HTTP headers are vulnerable to spoofing, where a * spoofing, where a malicious client could bypass restrictions by setting the
* malicious client could bypass restrictions by setting the * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
* X-Forwarded-For header directly. Therefore, Drupal's proxy * requires the IP addresses of all remote proxies to be specified in
* configuration requires the IP addresses of all remote proxies to be * $settings['reverse_proxy_addresses'] to work correctly.
* specified in $settings['reverse_proxy_addresses'] to work correctly.
* *
* Enable this setting to get Drupal to determine the client IP from the * Enable this setting to get Drupal to determine the client IP from the
* X-Forwarded-For header. If you are unsure about this setting, do not have a * X-Forwarded-For header. If you are unsure about this setting, do not have a
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment